Challenging Practical Features of Bitcoin by the Main Altcoins Andy Spurr1 and Marcel Ausloos1,2,3

Total Page:16

File Type:pdf, Size:1020Kb

Challenging Practical Features of Bitcoin by the Main Altcoins Andy Spurr1 and Marcel Ausloos1,2,3 Challenging Practical Features of Bitcoin by the Main Altcoins Andy Spurr1 and Marcel Ausloos1,2,3 1School of Business, University of Leicester, Brookfield, Leicester LE2 1RQ, UK 2Department of Statistics and Econometrics, Bucharest University of Economic Studies, 6 Piata Romana, 1st district, 010374 Bucharest, Romania 3 GRAPES, Sart Tilman, B‑4031 Liege, Belgium Abstract We study the fundamental differences that separate: Litecoin; Bitcoin Gold; Bitcoin Cash; Ethereum; and Zcash from Bitcoin, and draw analysis to how these features are appreciated by the market, to ultimately make an inference as to how future successful cryptocurrencies may behave. We use Google Trend data, as well as price, volume and market capitalization data sourced from coinmarketcap.com to support this analysis. We find that Litecoin’s shorter block times offer benefits in commerce, but drawbacks in the mining process through orphaned blocks. Zcash holds a niche use for anonymous transactions, benefitting areas of the world lacking in economic freedom. Bitcoin Cash suffers from centralization in the mining process, while the greater decentralization of Bitcoin Gold has generally left it to stagnate. Ether’s greater functionality offers the greatest threat to Bitcoin’s dominance in the market. A coin that incorporates several of these features can be technically better than Bitcoin, but the first-to- market advantage of Bitcoin should keep its dominant position in the market. Keywords: Cryptocurrencies, Bitcoin, Blockchain, Altcoins, Investor attention, Google search volume index, centralization 1 Introduction Much of the cryptocurrency market is focused on the supremacy of coins themselves, with less focus on the technical aspects that are the underlying factors for this success. Our motivation for this paper is to focus on these technical aspects, since the development of new coins, and improvements on existing coins benefit from this type of research. Using “scholarly” methodology, we attempt to gauge how the market values such features. We thereby perform a Qualitative analysis for a “better cryptocurrency choice” - although the final choice depends on the user’s own criteria, of course. Concluding this paper, we make predictions as to which existing features are likely to be successful as this market continues to develop. The cryptocurrency market has exploded in recent years, becoming an industry worth USD 470 bn (Coinmarketcap.com, 2018). Bitcoin (BTC) was the first currency of its kind; other alternative cryptocurrencies, ‘altcoins’, have since been created in an attempt to improve upon the way that their transaction value is digitally sent and received. The key innovation that can be attributed to Bitcoin’s rapid success is the use of the blockchain technology, but this is challenged (Chatterjee et al., 2018). The blockchain forms a competitive environment by which users known as ‘miners’ validate transactions in order to receive a reward – the issuance of new coins. Miners commit their computing power to the network in an attempt to crack a complex mathematical puzzle, that once solved, allows a block of transactions to occur (Nakamoto, 2008). This is known as proof of work. The use of this puzzle prevents a single user from consistently being able to create blocks on the blockchain, preventing them from acting maliciously, by validating their own false transaction. On the contrary, miners are incentivized to remain honest, as these honest miners are eligible for the reward of coins. This distributed system of verification allows for a scenario whereby all users can form a consensus of trust, eliminating the need for a central authority to provide the role of overseer. A user that wishes to cheat the system by creating a faulty blockchain would have to have access to more than 50% of the network’s total computing power - which is a staggering amount (Hruska, 2017). Since coins are introduced by the system itself, they can be traced across accounts to their inception, allowing all users to trust the integrity of a given transaction. The use of a block prevents these accounts from performing double-spends, since all transactions within a block are checked to be simultaneously valid. A Bitcoin address consists of a public key (shown on the blockchain) and a corresponding private key (Bitzuma.com, 2018). Public key cryptography is used to combine these two values in order to create an unforgeable message signature. These keys are linked through a signature algorithm, which is known by the network. The BTC network is pseudonymous, meaning that the addresses of wallets (public keys) are visible to all, since they are noted on the blockchain, which is public knowledge. The value of each transaction is known, but their respective owners are hidden. This has led many to Question the morality of the network, since users can perform illicit activities under the protection of the anonymity that the network provides (Chen, 2016). The network currently supports a system by which transacting users can offer a transaction fee in order to increase the likelihood that their transactions are included into an upcoming block. This transaction fee is rewarded to the miner that cracks the block’s puzzle, on top of the newly created coins. Currently, transaction fees only account for 1% of mining revenue (Blockchain.info, 2018). Once the final Bitcoins have been issued, miners are likely to compete for transaction fees, as opposed to newly created coins. One should notice that the Bitcoin protocol is merely a set of mathematical rules and code, which does not offer an individual anymore control than needed for an “average user”. Nevertheless, this offers a problem to the flexibility of the network to change; this is overcome through a process known as a ‘fork’. A fork is basically a software change, by which users change their protocol so that it matches that of other users. This makes changes to the Bitcoin network a matter of “democratic vote”, whence is purely optional. In Sect. 2, we provide a literature review on a reduced scale. Much information is, one should say obviously per se, in such an electronic world, obtained from the web. One could also say that most of the literature pertains to papers delivered at conferences, thus through conference proceedings. Remaining at a scholar level, we do our best to refer to papers which have undergone peer to peer review procedures. The research Questions are next outlined in Sect. 3, before the methodology in Sect. 4. The ”data” gathering is explained in Sect. 5, presenting the distinctive features of these six cryptocurrencies. A section, Sect. 6, on results with some discussion on Qualitative and Quantitative aspects follows. A conclusion section, Sect. 7, ends our report. 2 Literature review Bohme et al. (2015) argue that Bitcoin is not completely decentralized, due to certain barriers-to-entry within the necessary functions of the network. Bohme et al. (2015) find that exchanges are not decentralized, since they are subject to legislation from the nation in which they operate, which effectively prevents a free market for this service. Exchanges in the USA must register with the Financial Crimes Enforcement Network, which require the payment of a license fee that can be up to six figures in value, whilst exchanges in Germany are required to have a minimum capital requirement of EUR 5 million. These significant capital requirements prevent the average person from setting up an exchange, leading to imperfect competition within this sector. de Filippi and Loveluck (2016) consider the governance structure within the Bitcoin network and find that it is not completely decentralized. A Question still raised by Chohan (2019). Recently, Manavi et al. (2020) proved that the ”myth”, for the Bitcoin-based networks, i.e. decentralization is only true in specific regions, i.e., it is not distributed homogeneously. In fact, Shaw and Hill (2014) had suggested that the governance of Bitcoin relies on leaders, forming oligarchic organizations, thus ”centralized”. Hruska (2014) questions the decentralization of the Bitcoin mining process, as mining ‘pools’ have formed by which users pool their computing power in order to distribute mining rewards evenly across users, allowing for more consistent income from the mining process. Some of these pools offer this service in exchange for voting rights, which can allow these pools to have heavy influences on decisions such as voting on forks. This acts to centralize the network, since it increases the influence that a single voter might have on decisions. Eyal et al. (2016) study the impact of changing the block size and block times, and find that, although changes to this can increase the scale by which the network can handle transactions, these changes come at the cost of greater centralization. They find that fairness suffers, as any increase in the rate at which work is done benefits those with the capital to respond to such changes, while restricting users that cannot meet the increased demands in storage and processing speed. Barber et al. (2012) find that the capped supply of Bitcoin will likely lead to an interesting scenario by which any appreciation in the currency’s value will translate directly into an appreciation of the coin’s price, as opposed to fiat currencies that are continuously printed, giving them an outlet for this growth. The main drivers of the Bitcoin price can be studied in many ways, as through a “Wavelet Coherence Analysis’ (Kristoufek, 2015). Ammous (2018) studies the trends in currency printing, and finds that over the next 25 years, the supply of USD will likely increase by 372%, with GBP supply increasing even greater, at 530%. When compared to Bitcoin’s 27% increase in the same period, the use of BTC as a store of value may be extremely appealing (Ammous, 2018), as it does not suffer the same loss in purchasing power as other fiat currencies.
Recommended publications
  • Peer Co-Movement in Crypto Markets
    Peer Co-Movement in Crypto Markets G. Schwenkler and H. Zheng∗ February 4, 2021y Abstract We show that peer linkages induce significant price co-movement in crypto markets in excess of common risk factors and correlated demand shocks. When large abnormal return shocks hit one crypto, its peers experience unusually large abnormal returns of the opposite sign. These effects are primarily concentrated among smaller peers and revert after several weeks, resulting in predictable returns. We develop trading strategies that exploit this rever- sal, and show that they are profitable even after accounting for trading fees and frictions. We establish our results by identifying crypto peers through co-mentions in online news using novel natural language processing technologies. Keywords: Cryptocurrencies, peers, co-movement, competition, natural language pro- cessing. JEL codes: G12, G14, C82. ∗Schwenkler is at the Department of Finance, Santa Clara University Leavey School of Business. Zheng is at the Department of Finance, Boston University Questrom School of Business. Schwenkler is corresponding author. Email: [email protected], web: http://www.gustavo-schwenkler.com. yThis is a revision of a previous paper by the two authors called \Competition or Contagion: Evidence from Cryptocurrency Markets." We are grateful to Jawad Addoum (discussant), Daniele Bianchi (discussant), Will Cong, Tony Cookson, Sanjiv Das, Seoyoung Kim, Andreas Neuhierl, Farzad Saidi, and Antoinette Schoar, seminar participants at Boston University and the Society for Financial Econometrics, and the participants at the 2020 Finance in the Cloud III Virtual Conference, the 2020 MFA Annual Meeting, the 3rd UWA Blockchain, Cryptocurrency and FinTech Conference, and the 2020 INFORMS Annual Meeting for useful comments and suggestions.
    [Show full text]
  • Linking Wallets and Deanonymizing Transactions in the Ripple Network
    Proceedings on Privacy Enhancing Technologies ; 2016 (4):436–453 Pedro Moreno-Sanchez*, Muhammad Bilal Zafar, and Aniket Kate* Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network Abstract: The decentralized I owe you (IOU) transac- 1 Introduction tion network Ripple is gaining prominence as a fast, low- cost and efficient method for performing same and cross- In recent years, we have observed a rather unexpected currency payments. Ripple keeps track of IOU credit its growth of IOU transaction networks such as Ripple [36, users have granted to their business partners or friends, 40]. Its pseudonymous nature, ability to perform multi- and settles transactions between two connected Ripple currency transactions across the globe in a matter of wallets by appropriately changing credit values on the seconds, and potential to monetize everything [15] re- connecting paths. Similar to cryptocurrencies such as gardless of jurisdiction have been pivotal to their suc- Bitcoin, while the ownership of the wallets is implicitly cess so far. In a transaction network [54, 55, 59] such as pseudonymous in Ripple, IOU credit links and transac- Ripple [10], users express trust in each other in terms tion flows between wallets are publicly available in an on- of I Owe You (IOU) credit they are willing to extend line ledger. In this paper, we present the first thorough each other. This online approach allows transactions in study that analyzes this globally visible log and charac- fiat money, cryptocurrencies (e.g., bitcoin1) and user- terizes the privacy issues with the current Ripple net- defined currencies, and improves on some of the cur- work.
    [Show full text]
  • User Manual Ledger Nano S
    User Manual Ledger Nano S Version control 4 Check if device is genuine 6 Buy from an official Ledger reseller 6 Check the box contents 6 Check the Recovery sheet came blank 7 Check the device is not preconfigured 8 Check authenticity with Ledger applications 9 Summary 9 Learn more 9 Initialize your device 10 Before you start 10 Start initialization 10 Choose a PIN code 10 Save your recovery phrase 11 Next steps 11 Update the Ledger Nano S firmware 12 Before you start 12 Step by step instructions 12 Restore a configuration 18 Before you start 19 Start restoration 19 Choose a PIN code 19 Enter recovery phrase 20 If your recovery phrase is not valid 20 Next steps 21 Optimize your account security 21 Secure your PIN code 21 Secure your 24-word recovery phrase 21 Learn more 22 Discover our security layers 22 Send and receive crypto assets 24 List of supported applications 26 Applications on your Nano S 26 Ledger Applications on your computer 27 Third-Party applications on your computer 27 If a transaction has two outputs 29 Receive mining proceeds 29 Receiving a large amount of small transactions is troublesome 29 In case you received a large amount of small payments 30 Prevent problems by batching small transactions 30 Set up and use Electrum 30 Set up your device with EtherDelta 34 Connect with Radar Relay 36 Check the firmware version 37 A new Ledger Nano S 37 A Ledger Nano S in use 38 Update the firmware 38 Change the PIN code 39 Hide accounts with a passphrase 40 Advanced Passphrase options 42 How to best use the passphrase feature 43
    [Show full text]
  • On the Relationship of Cryptocurrency Price with US Stock and Gold Price Using Copula Models
    mathematics Article On the Relationship of Cryptocurrency Price with US Stock and Gold Price Using Copula Models Jong-Min Kim 1 , Seong-Tae Kim 2 and Sangjin Kim 3,* 1 Statistics Discipline, University of Minnesota at Morris, Morris, MN 56267, USA; [email protected] 2 Department of Mathematics, North Carolina A&T State University, Greensboro, NC 27411, USA; [email protected] 3 Department of Management and Information Systems, Dong-A University, Busan 49236, Korea * Correspondence: [email protected] Received: 15 September 2020; Accepted: 20 October 2020; Published: 23 October 2020 Abstract: This paper examines the relationship of the leading financial assets, Bitcoin, Gold, and S&P 500 with GARCH-Dynamic Conditional Correlation (DCC), Nonlinear Asymmetric GARCH DCC (NA-DCC), Gaussian copula-based GARCH-DCC (GC-DCC), and Gaussian copula-based Nonlinear Asymmetric-DCC (GCNA-DCC). Under the high volatility financial situation such as the COVID-19 pandemic occurrence, there exist a computation difficulty to use the traditional DCC method to the selected cryptocurrencies. To solve this limitation, GC-DCC and GCNA-DCC are applied to investigate the time-varying relationship among Bitcoin, Gold, and S&P 500. In terms of log-likelihood, we show that GC-DCC and GCNA-DCC are better models than DCC and NA-DCC to show relationship of Bitcoin with Gold and S&P 500. We also consider the relationships among time-varying conditional correlation with Bitcoin volatility, and S&P 500 volatility by a Gaussian Copula Marginal Regression (GCMR) model. The empirical findings show that S&P 500 and Gold price are statistically significant to Bitcoin in terms of log-return and volatility.
    [Show full text]
  • IFRS: Accounting for Crypto-Assets
    IFRS (#) Accounting for crypto-assets Contents 1. Introduction 1 2. What are crypto-assets? 2 2.1. Cryptocurrencies 3 2.2. Tokens (crypto-assets other than cryptocurrencies) 5 3. Accounting for crypto-assets 10 3.1. Selected activities of standard setters 10 3.2. Special situations 13 3.3. Conclusion 15 4. Supporting details 16 5. Contacts 21 1 Introduction Crypto-assets experienced a breakout year in 2017. Cryptocurrencies, such as bitcoin and ether, have seen their prices surge as the public’s YoYj]f]kk`Ykaf[j]Yk]\$Yf\ÕfYf[aYdeYjc]lhYjla[ahYflk`Yn]l`mk af[j]Ykaf_dqlmjf]\l`]ajYll]flagflgl`]h`]fge]fgf&KaemdlYf]gmkdq$ a wave of new crypto-asset issuance has been sweeping the start-up fundraising world, sparking the interest of regulators in the process. 9[[gmflYflk`Yn]l`mk^YjZ]]ffglYZd]Zql`]ajj]dYlan]YZk]f[]^jge l`YlfYjjYlan]&H]j`Yhk$egklfglYZd]akl`]^Y[ll`Yll`]9mkljYdaYf 9[[gmflaf_KlYf\Yj\k:gYj\ 99K:!`YkkmZeall]\Y\ak[mkkagfhYh]j gfÉ\a_alYd[mjj]f[a]kÊlgl`]Afl]jfYlagfYd9[[gmflaf_KlYf\Yj\k :gYj\ A9K:!$Yf\l`]9[[gmflaf_KlYf\Yj\k:gYj\g^BYhYf 9K:B! `Ykakkm]\Yf]phgkmj]\jY^l^gjhmZda[[gee]flgfY[[gmflaf_^gj “virtual currencies”.1AfY\\alagf$l`]A9K:\ak[mkk]\[]jlYaf^]Ylmj]kg^ ljYfkY[lagfkafngdnaf_\a_alYd[mjj]f[a]k\mjaf_alke]]laf_afBYfmYjq *()0$Yf\oadd\ak[mkkaf^mlmj]o`]l`]jlg[gee]f[]Yj]k]Yj[`hjgb][l in this area.1 L`akYdkg`a_`da_`lkl`]dY[cg^YklYf\Yj\ar]\[jqhlg%Ykk]llYpgfgeq$ o`a[`eYc]kal\a^Õ[mdllg\]l]jeaf]l`]Yhhda[YZadalqg^klYf\Yj\k]ll]jkÌ hmZdak`]\h]jkh][lan]k&>mjl`]jegj]$\m]lgl`]\an]jkalqYf\hY[]g^ affgnYlagfYkkg[aYl]\oal`[jqhlg%Ykk]lk$l`]^Y[lkYf\[aj[meklYf[]k g^]Y[`af\ana\mYd[Yk]oadd\a^^]j$eYcaf_al\a^Õ[mdllg\jYo_]f]jYd [gf[dmkagfkgfl`]Y[[gmflaf_lj]Yle]fl& <]khal]l`]eYjc]lÌkaf[j]Ykaf_dqmj_]flf]]\^gjY[[gmflaf__ma\Yf[]$ l`]j]`Yn]Z]]ffg^gjeYdhjgfgmf[]e]flkgfl`aklgha[lg\Yl]& Afl`akj]hgjl$o]YaelgÕjklZja]Öqafljg\m[][jqhlg[mjj]f[a]kYf\ gl`]jlqh]kg^[jqhlg%Ykk]lk&L`]f$o]\ak[mkkkge]g^l`]j][]fl activities by accounting standard setters in relation to crypto-assets.
    [Show full text]
  • Banking on Bitcoin: BTC As Collateral
    Banking on Bitcoin: BTC as Collateral Arcane Research Bitstamp Arcane Research is a part of Arcane Crypto, Bitstamp is the world’s longest-running bringing data-driven analysis and research cryptocurrency exchange, supporting to the cryptocurrency space. After launch in investors, traders and leading financial August 2019, Arcane Research has become institutions since 2011. With a proven track a trusted brand, helping clients strengthen record, cutting-edge market infrastructure their credibility and visibility through and dedication to personal service with a research reports and analysis. In addition, human touch, Bitstamp’s secure and reliable we regularly publish reports, weekly market trading venue is trusted by over four million updates and articles to educate and share customers worldwide. Whether it’s through insights. their intuitive web platform and mobile app or industry-leading APIs, Bitstamp is where crypto enters the world of finance. For more information, visit www.bitstamp.net 2 Banking on Bitcoin: BTC as Collateral Banking on bitcoin The case for bitcoin as collateral The value of the global market for collateral is estimated to be close to $20 trillion in assets. Government bonds and cash-based securities alike are currently the most important parts of a well- functioning collateral market. However, in that, there is a growing weakness as rehypothecation creates a systemic risk in the financial system as a whole. The increasing reuse of collateral makes these assets far from risk-free and shows the potential instability of the financial markets and that it is more fragile than many would like to admit. Bitcoin could become an important part of the solution and challenge the dominating collateral assets in the future.
    [Show full text]
  • Vulnerability of Blockchain Technologies to Quantum Attacks
    Vulnerability of Blockchain Technologies to Quantum Attacks Joseph J. Kearneya, Carlos A. Perez-Delgado a,∗ aSchool of Computing, University of Kent, Canterbury, Kent CT2 7NF United Kingdom Abstract Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048. Blockchain technologies rely on cryptographic protocols for many of their essential sub- routines. Some of these protocols, but not all, are open to quantum attacks. Here we analyze the major blockchain-based cryptocurrencies deployed today—including Bitcoin, Ethereum, Litecoin and ZCash, and determine their risk exposure to quantum attacks. We finish with a comparative analysis of the studied cryptocurrencies and their underlying blockchain technologies and their relative levels of vulnerability to quantum attacks. Introduction exist to allow the legitimate owner to recover this account. Blockchain systems are unlike other cryptosys- tems in that they are not just meant to protect an By contrast, in a blockchain system, there is no information asset. A blockchain is a ledger, and as central authority to manage users’ access keys. The such it is the asset. owner of a resource is by definition the one hold- A blockchain is secured through the use of cryp- ing the private encryption keys. There are no of- tographic techniques. Notably, asymmetric encryp- fline backups. The blockchain, an always online tion schemes such as RSA or Elliptic Curve (EC) cryptographic system, is considered the resource— cryptography are used to generate private/public or at least the authoritative description of it.
    [Show full text]
  • Blockchain Law: the Fork Not Taken
    Blockchain Law The fork not taken Robert A. Schwinger, New York Law Journal — November 24, 2020 I shall be telling this with a sigh Somewhere ages and ages hence: Two roads diverged in a wood, and I— I took the one less traveled by, And that has made all the difference. — Robert Frost Is the token holder — often the holder of some form of digital currency — always free to choose which branch of the fork to take? A blockchain is often envisioned as a record of a single continuous Background: ‘Two roads diverged in a sequential series of transactions, like the links of the metaphorical chain from which the term “blockchain” derives. But sometimes yellow wood’ the chain turns out to be not so single or continuous. Sometimes situations can arise where a portion of the chain can branch off A blockchain fork occurs when someone seeks to divide a into a new direction from the original chain, while the original chain blockchain into two branches by changing its source code, which also continues to move forward separately. This presents a choice is possible to do because the code is open. For those users who for the current holders of the digital tokens on that blockchain choose to upgrade their software, the software then “rejects about which direction they wish to follow going forward. In the all transactions from older software, effectively creating a new world of blockchain, this scenario is termed a “fork.” branch of the blockchain. However, those users who retain the old software continue to process transactions, meaning that But is the tokenholder—often the holder of some form of digital there is a parallel set of transactions taking place across two currency—always free to choose which branch of the fork to different chains.” See generally N.
    [Show full text]
  • Blocksci: Design and Applications of a Blockchain Analysis Platform
    BlockSci: Design and applications of a blockchain analysis platform Harry Kalodner Steven Goldfeder Alishah Chator [email protected] [email protected] [email protected] Princeton University Princeton University Johns Hopkins University Malte Möser Arvind Narayanan [email protected] [email protected] Princeton University Princeton University ABSTRACT to partition eectively. In fact, we conjecture that the use of a tra- Analysis of blockchain data is useful for both scientic research ditional, distributed transactional database for blockchain analysis and commercial applications. We present BlockSci, an open-source has innite COST [5], in the sense that no level of parallelism can software platform for blockchain analysis. BlockSci is versatile in outperform an optimized single-threaded implementation. its support for dierent blockchains and analysis tasks. It incorpo- BlockSci comes with batteries included. First, it is not limited rates an in-memory, analytical (rather than transactional) database, to Bitcoin: a parsing step converts a variety of blockchains into making it several hundred times faster than existing tools. We a common, compact format. Currently supported blockchains in- describe BlockSci’s design and present four analyses that illustrate clude Bitcoin, Litecoin, Namecoin, and Zcash (Section 2.1). Smart its capabilities. contract platforms such as Ethereum are outside our scope. Second, This is a working paper that accompanies the rst public release BlockSci includes a library of useful analytic and visualization tools, of BlockSci, available at github.com/citp/BlockSci. We seek input such as identifying special transactions (e.g., CoinJoin) and linking from the community to further develop the software and explore addresses to each other based on well-known heuristics (Section other potential applications.
    [Show full text]
  • Using Blockchain Technology to Secure the Internet of Things
    Using Blockchain Technology to Secure the Internet of Things Presented by the Blockchain/ Distributed Ledger Working Group © 2018 Cloud Security Alliance – All Rights Reserved. You may download, store, display on your computer, view, print, and link to Using Blockchain Technology to Secure the Internet of Things subject to the following: (a) the Document may be used solely for your personal, informational, non- commercial use; (b) the Report may not be modified or altered in any way; (c) the Document may not be redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote portions of the Document as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to the Using Blockchain Technology to Secure the Internet of Things paper. Blockchain/Distributed Ledger Technology Working Group | Using Blockchain Technology to Secure the Internet of Things 2 © Copyright 2018, Cloud Security Alliance. All rights reserved. ABOUT CSA The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at www.cloudsecurityalliance.org and follow us on Twitter @cloudsa. Blockchain/Distributed Ledger Technology Working Group | Using Blockchain Technology to Secure the Internet of Things 3 © Copyright 2018, Cloud Security Alliance. All rights reserved.
    [Show full text]
  • Merged Mining: Curse Or Cure?
    Merged Mining: Curse or Cure? Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios Voyiatzis, Edgar Weippl SBA Research, Vienna, Austria (firstletterfirstname)(lastname)@sba-research.org Abstract: Merged mining refers to the concept of mining more than one cryp- tocurrency without necessitating additional proof-of-work effort. Although merged mining has been adopted by a number of cryptocurrencies already, to this date lit- tle is known about the effects and implications. We shed light on this topic area by performing a comprehensive analysis of merged mining in practice. As part of this analysis, we present a block attribution scheme for mining pools to assist in the evaluation of mining centralization. Our findings disclose that mining pools in merge-mined cryptocurrencies have operated at the edge of, and even beyond, the security guarantees offered by the underlying Nakamoto consensus for ex- tended periods. We discuss the implications and security considerations for these cryptocurrencies and the mining ecosystem as a whole, and link our findings to the intended effects of merged mining. 1 Introduction The topic of merged mining has received little attention from the scientific community, despite having been actively employed by a number of cryptocurrencies for several years. New and emerging cryptocurrencies such as Rootstock continue to consider and expand on the concept of merged mining in their designs to this day [19]. Merged min- ing refers to the process of searching for proof-of-work (PoW) solutions for multiple cryptocurrencies concurrently without requiring additional computational resources. The rationale behind merged mining lies in leveraging on the computational power of different cryptocurrencies by bundling their resources instead of having them stand in direct competition, and also to serve as a bootstrapping mechanism for small and fledgling networks [27, 33].
    [Show full text]
  • Can Ethereum Classic Reach 1000 Dollars Update [06-07-2021] 42 Loss in the Last 24 Hours
    1 Can Ethereum Classic Reach 1000 Dollars Update [06-07-2021] 42 loss in the last 24 hours. At that time Bitcoin reached its all-time high of 20,000 and so did Ethereum ETH which surpassed 1,000. 000 to reach 1; Tezos XTZ is priced at 2. In the unlikely event of a significant change for the worst, we expect the Bitcoin price to continue appreciating. ERC-721 started as a EIP draft written by dete and first came to life in the CryptoKitties project by Axiom Zen. ERC-721 A CLASS OF UNIQUE TOKENS. It does not mandate a standard for token metadata or restrict adding supplemental functions. Think of them like rare, one-of-a-kind collectables. The Standard. Institutions are mandating that they invest in clean green technologies and that s what ethereum is becoming, she said. Unlike bitcoin s so-called proof of work, which rewards miners who are competing against each other to use computers and energy to record and confirm transactions on its blockchain, ethereum plans to adopt the more efficient proof of stake model, which chooses a block validator at random based on how much ether it controls. Kaspar explained her thesis Friday on Yahoo Finance Live, citing new updates coming to the cryptocurrency s network later this year. 42 loss in the last 24 hours. At that time Bitcoin reached its all-time high of 20,000 and so did Ethereum ETH which surpassed 1,000. 000 to reach 1; Tezos XTZ is priced at 2. In the unlikely event of a significant change for the worst, we expect the Bitcoin price to continue appreciating.
    [Show full text]